{"title":"移动计算环境中的匿名性","authors":"N. Asokan","doi":"10.1109/MCSA.1994.513484","DOIUrl":null,"url":null,"abstract":"In a mobile computing environment, it is desirable to protect information about the movements and activities of mobile entities from onlookers. Solutions to this problem of providing anonymity have to be developed with the constraints of mobile computing environments in mind. It is argued that this issue merits investigation. A brief survey of the nature of anonymity provided in proposed or existing mobile computing environments is presented. It is argued further that achieving limited but practical anonymity using standard cryptographic techniques is feasible. Example solutions are presented.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"70 1","pages":"200-204"},"PeriodicalIF":0.0000,"publicationDate":"1994-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Anonymity in a mobile computing environment\",\"authors\":\"N. Asokan\",\"doi\":\"10.1109/MCSA.1994.513484\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In a mobile computing environment, it is desirable to protect information about the movements and activities of mobile entities from onlookers. Solutions to this problem of providing anonymity have to be developed with the constraints of mobile computing environments in mind. It is argued that this issue merits investigation. A brief survey of the nature of anonymity provided in proposed or existing mobile computing environments is presented. It is argued further that achieving limited but practical anonymity using standard cryptographic techniques is feasible. Example solutions are presented.\",\"PeriodicalId\":88972,\"journal\":{\"name\":\"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications\",\"volume\":\"70 1\",\"pages\":\"200-204\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1994-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MCSA.1994.513484\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MCSA.1994.513484","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In a mobile computing environment, it is desirable to protect information about the movements and activities of mobile entities from onlookers. Solutions to this problem of providing anonymity have to be developed with the constraints of mobile computing environments in mind. It is argued that this issue merits investigation. A brief survey of the nature of anonymity provided in proposed or existing mobile computing environments is presented. It is argued further that achieving limited but practical anonymity using standard cryptographic techniques is feasible. Example solutions are presented.